Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation
Resource Information
The work Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation represents a distinct intellectual or artistic creation found in European University Institute. This resource is a combination of several types including: Work, Language Material, Books.
The Resource
Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation
Resource Information
The work Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation represents a distinct intellectual or artistic creation found in European University Institute. This resource is a combination of several types including: Work, Language Material, Books.
- Label
- Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation
- Title remainder
- Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation
- Statement of responsibility
- by Sara Díaz Cardell, Amparo Fúster-Sabater
- Language
- eng
- Summary
- This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples and references. Further, the book discusses several attacks on these generators and applications. It concludes by demonstrating how the output sequences can be modeled by means of different families of one-dimensional cellular automata, rendering the generators vulnerable to attacks. Intended for researchers and graduate students, the book will hopefully inspire them to search for more details on this family of generators and to address the open problems in this field.--
- Assigning source
- Provided by publisher
- Image bit depth
- 0
- Literary form
- non fiction
- Nature of contents
- dictionaries
- Series statement
-
- SpringerBriefs in Mathematics,
- Springer eBooks
- Springer eBooks.
Context
Context of Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular DecimationWork of
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/A5mccATN9xs/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/A5mccATN9xs/">Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.eui.eu/">European University Institute</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Work Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/A5mccATN9xs/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/A5mccATN9xs/">Cryptography with Shrinking Generators : Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.eui.eu/">European University Institute</a></span></span></span></span></div>